Security (V) Flashcards
VLAN Hopping
*Ability to send traffic from one VLAN into another, bypassing VLAN segmentation
*Sending packets to a port not usually accessible from an end system
ARP Spoofing
Sending falsified ARP Messages over a local area network
Spoofing
Occurs when an attacker masquerades as another person by falsifying their identity
On-Path/Man-in-the-Middle (MITM) Attack
Occurs when an attacker puts themselves between the victim and the intended destination.
Session Hijacking
Attacker guesses the session ID in use between a client and server and takes over the authenticated session.
DNS Poisoning
An attacker manipulates known vulnerabilities within DNS to reroute traffic to a fake version of a site.
Rogue DHCP Server
A DHCP server on a network which is not under the administrative control of the network admins
TCP SYN Flood
Occurs when an attacker initiates multiple TCP sessions, but never completes them.
Smurf Attack (ICMP Flood)
An attacker sends a ping to a subnet broadcast address with the source IP spoofed to that of the victim server.
Purging/Sanitizing
Removes data which cannot be reconstructed using any known forensic techniques
Clearing Technique
Removes data with a certain amount of assurance that it can’t be reconstructed.
Access Control Vestibule (Mantrap)
An area between two doorways that holds people until they are identified and authenticated.
Network Access Control (NAC)
Ensures a device is scanned to determine its current state of security prior to being allowed network access.
Persistent Agent
A piece of software installed on a device requesting access to the network
Non-Persistent Agent
Requires the users to connect to the network and go to a web-based captive portal to download an agent onto their devices.
Zero-Day Vulnerability
A new vulnerability that no one knows about yet.
Common Vulnerabilities and Exposures (CVE)
List of known vulnerabilities
Posture Assessment
Assesses cyber risk posture and exposure to threats cause by misconfigurations and patching delays.
Business Risk Assessment
Used to identify, understand, and evaluate potential hazards in the workplace
Mandatory Access Control (MAC)
Access control policy where the computer system gets to decide who gets access to what objects
Zero-Trust
A security framework that requires users to be authenticated and authorized before being granted access to applications and data.
DMZ
A perimeter network that protects an organization’s internal local area network from untrusted traffic
Screen Subnet
Subnet int the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks
Dual Control
Two people have to be present at the same time to do something